Course Description

Focus on technology-based crimes. Explore cyber offenses including information warfare, cyber terrorism, information theft, data corruption and disruption of service. Discuss computing devices as instruments furthering exploitation of children, organized crime and other criminal acts. Identify vulnerabilities within national and private infrastructures, assess risks and structure security measures. CEUs issued. $382 includes $10 fee. Note: All sections also offered for credit as CJS-206.

Learner Outcomes

Apply key concepts from cases and statutes to resolving cybercrime issues; resolve cybercrime jurisdictional questions involving law enforcement and state/federal court systems; identify risks cyber criminals and cyber terrorists pose to the nations infrastructure; describe the necessary partnerships between private citizens, private organizations and government necessary to combat cybercrime; identify crimes involving the use of computer technology; identify crimes in which data theft and system and data destruction are targeted; analyze application of statutory and common law to technology-based crimes; conduct risk analysis of computer systems and infrastructure.
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .